Abstract
Cyber security is becoming more and more concerned by people nowadays. Intrusion detection systems (IDSs) is a major approach to ensure the confidentiality, integrity and availability of network system resources. There are many machine learning techniques applied to IDSs. In this paper, we propose a novel and rapid technique based on Hierarchical Extreme Learning Machine (H-ELM) for intrusion detection. We use NSL-KDD 2009 dataset to evaluate our method. Comparing our method with other widely used machine learning methods such as k-Nearest Neighbor (k-NN), Random Forest (RF) and Extreme Learning Machine (ELM), the experimental results show that H-ELM can perform better than or similar to other methods in overall accuracy of 72.87%, while only spends a total time of 2.04 s which is much faster than other methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Singh, R., Kumar, H., Singla, R.K.: An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst. Appl. 42(22), 8609–8624 (2015)
Liu, Q., Yin, J., Leung, V.C.M., Cai, Z.: FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs. IEEE Trans. Wirel. Commun. 12(10), 5124–5137 (2013)
Ambusaidi, M., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)
Chen, Y., Abraham, A., Yang, B.: Hybrid Flexible Neural-Tree-Based Intrusion Detection Systems: Research Articles. Wiley (2007)
Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2017)
Sarasamma, S.T., Zhu, Q.A., Huff, J.: Hierarchical kohonenen net for anomaly detection in network security. IEEE Trans. Syst. Man Cybern. Part B Cybern. 35(2), 302–12 (2005)
Lin, W.C., Ke, S.W., Tsai, C.F.: CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl. Based Syst. 78(1), 13–21 (2015)
Zhang, L., Zhang, D., Tian, F.: SVM and ELM: Who Wins? Object Recognition with Deep Convolutional Features from ImageNet. Springer International Publishing (2016)
Huang, G.B., Zhu, Q.Y., Siew, C.K.: Extreme learning machine: theory and applications. Neurocomputing 70(1), 489–501 (2006)
Liu, Q., Yin, J., Leung, V.C.M., Zhai, J.H., Cai, Z., Lin, J.: Applying a new localized generalization error model to design neural networks trained with extreme learning machine. Neural Comput. Appl. 27(1), 59–66 (2016)
Tang, J., Deng, C., Huang, G.B.: Extreme learning machine for multilayer perceptron. IEEE Trans. Neural Netw. Learn. Syst. 27(4), 809–821 (2017)
Liu, Q., Zhou, S., Zhu, C., Liu, X., Yin, J.: MI-ELM: highly efficient multi-instance learning based on hierarchical extreme learning machine. Neurocomputing 173, 1044–1053 (2015)
Tsai, C.F., Hsu, Y.F., Lin., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994–12000 (2009)
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: IEEE International Conference on Computational Intelligence for Security Defense Applications, pp. 1–6 (2009)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant No. 61772561) and the Key Research & Development Plan of Hunan Province (Grant No. 2018NK2012).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Yu, L., Liu, Y., Zhao, W., Liu, Q., Qin, J. (2019). A Highly Efficient Intrusion Detection Method Based on Hierarchical Extreme Learning Machine. In: Cao, J., Vong, C., Miche, Y., Lendasse, A. (eds) Proceedings of ELM-2017. ELM 2017. Proceedings in Adaptation, Learning and Optimization, vol 10. Springer, Cham. https://doi.org/10.1007/978-3-030-01520-6_29
Download citation
DOI: https://doi.org/10.1007/978-3-030-01520-6_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01519-0
Online ISBN: 978-3-030-01520-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)